Overview

A vulnerability exists in Microsoft Internet Explorer that could result in remote code execution.

A vulnerability exists in Microsoft Internet Explorer that could result in remote code execution.
The vulnerability is in the way that Internet Explorer accesses an object that has not been correctly initialized or has been deleted in the IE8 Developer Toolbar. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When the page is viewed, the vulnerability could allow remote code execution. An attacker who successfully exploited the vulnerability could then gain the same user rights as the logged-on user.